2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops 2015
DOI: 10.1109/waina.2015.113
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Efficient Mobile Personal Health Data Sharing in Resource Constrained Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0
4

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 19 publications
0
5
0
4
Order By: Relevance
“…To that effect, a secure architecture for handling personal health records on mobile phones was proposed. 29 The assumption was that the cheaper bandwidth would lead to high-speed internet to support technology-enabled services. Health institutions, medical practitioners and other citizens – regardless of geographical location – would be able to link with and share or seek medical expertise and knowledge.…”
Section: Discussionmentioning
confidence: 99%
“…To that effect, a secure architecture for handling personal health records on mobile phones was proposed. 29 The assumption was that the cheaper bandwidth would lead to high-speed internet to support technology-enabled services. Health institutions, medical practitioners and other citizens – regardless of geographical location – would be able to link with and share or seek medical expertise and knowledge.…”
Section: Discussionmentioning
confidence: 99%
“…The communication and computational costs are low. In paper [11] the privacy and security requirements for the personal health records (PHR) system is provided by an ac(access control) framework gets support through the IBE(identity-based encryption ) for securing the PHR system. The framework is designed which enables the secure transfer/sharing of the PHRs.…”
Section: Literature Surveymentioning
confidence: 99%
“…He's got to expect keys are issued by generators together with structures that are correct to users. Moreover, after re-encryption happens, users in same arrangement all necessity need their private keys re-issued so as to access their documents, also this procedure causes issues in execution.CP-ABEBack in CP-ABE[9] every single and every consumer is correlated having a pair of features. User key is related to an entry arrangement.…”
mentioning
confidence: 99%